US11108546B2 - Biometric verification of a blockchain database transaction contributor - Google Patents

Biometric verification of a blockchain database transaction contributor Download PDF

Info

Publication number
US11108546B2
US11108546B2 US16/854,103 US202016854103A US11108546B2 US 11108546 B2 US11108546 B2 US 11108546B2 US 202016854103 A US202016854103 A US 202016854103A US 11108546 B2 US11108546 B2 US 11108546B2
Authority
US
United States
Prior art keywords
pseudonymous identifier
biometric
pseudonymous
biometric features
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US16/854,103
Other versions
US20200252203A1 (en
Inventor
David BENINI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aware Inc
Original Assignee
Aware Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aware Inc filed Critical Aware Inc
Priority to US16/854,103 priority Critical patent/US11108546B2/en
Publication of US20200252203A1 publication Critical patent/US20200252203A1/en
Application granted granted Critical
Publication of US11108546B2 publication Critical patent/US11108546B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • An exemplary embodiment relates generally to a blockchain database and particularly to the use of biometrics to enroll and/or verify a blockchain database transaction contributor.
  • biometric information protection algorithms and schemes An important feature of biometric information protection algorithms and schemes is the ability to encode messages within the encoded data that may be decoded only when a biometric is successfully matched to the biometric used to encode the message.
  • a blockchain database employs cryptography and other methods to implement and protect a transaction ledger, to which transactions can be added but not edited without detection.
  • a transaction ledger may be public and distributed or private.
  • Blockchain databases are highly resistant to tampering because of their cryptographic tamper detection mechanisms.
  • a transaction ledger utilizing a blockchain database has applications in cryptocurrencies, banking, payments, smart contracts, and other applications.
  • While a key feature of a blockchain database is the anonymity of the humans contributing transactions, there are applications in which it may be useful to have the ability, with the cooperation of a contributor, to demonstrate the contributor's association with one or more transactions in a transaction ledger. It is also conceivable that a user may seek to repudiate a purported role as a contributor to a transaction.
  • Bitcoin is a payment system that serves as an example of the creation and use of a blockchain database.
  • U.S. Patent Publication No. 2015/0262171 discusses Bitcoin and blockchain technology in detail and is expressly incorporated herein by reference in its entirety.
  • a cryptographic public/private key pair is generated by a user.
  • the private key is held solely by the contributor (e.g. in a “wallet software”) and used to claim bitcoins.
  • An “address” is a hash of the public key, and is noted in each bitcoin exchange, serving like an account number.
  • a contributor may have different addresses for each transaction to enhance their anonymity in the transaction ledger. Bitcoins are passed from address to address with each transaction.
  • the private key is also used to create a digital signature of the transaction.
  • the public key is included in the transaction. These enable someone to verify that the contributor of the transaction is the holder of the associated private key via cryptographic challenge and response. If the private key is lost or stolen, however, the claim to a transaction may also be lost
  • Transactions in a blockchain ledger are intentionally anonymous, ideally containing no personally identifiable information (hereinafter “PII”).
  • PII personally identifiable information
  • Biometrics can be used to unambiguously link a human being to digital information using their unique physical traits in a way that is analogous to a handwritten signature or digital signature.
  • Biometric data protection techniques enable this to be done in a way that anonymizes biometric data, preventing it from being useful for fraud in the event it is compromised. These techniques also enable encoding of messages that can only be decoded when a biometric match is achieved.
  • the use of biometrics in addition to conventional, digital security methods adds an organic level of protection not possible through the use of computer processes alone.
  • One exemplary embodiment is directed generally to a blockchain database and particularly to the use of biometrics to enroll and/or verify a blockchain database transaction contributor.
  • FIG. 1 depicts a flowchart for a method of enrolling a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 2 depicts a flowchart for a method of verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 3 depicts a flowchart for a method of enrolling a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 4 depicts a flowchart for a method of verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 5A depicts a flowchart for a method of operating a pseudonymous identifier encoder according to an embodiment of the disclosure.
  • FIG. 5B depicts a flowchart for a method of operating a pseudonymous identifier recoder according to an embodiment of the disclosure.
  • FIG. 6A depicts an overview flowchart for a method of enrolling and verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 6B depicts an overview flowchart for a method of enrolling and verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
  • FIG. 7A depicts a flowchart for a method of operating a pseudonymous identifier encoder according to an embodiment of the disclosure.
  • FIG. 7B depicts a flowchart for a method of operating a pseudonymous identifier recoder according to an embodiment of the disclosure.
  • FIG. 8 depicts an example structure of a system enabled to perform blockchain enrolment and verification according to at least one example embodiment.
  • An exemplary embodiment describes multiple methods to 1) create biometric data and store it in a blockchain transaction such that it may be used in the future to biometrically verify the identity of the contributor of the transaction, and 2) use encoded “live” biometric data to determine whether the blockchain transaction was or was not created by a particular individual.
  • These capabilities can be achieved without including PII or transaction linking data in the blockchain transaction and can be performed in a distributed fashion over a network.
  • One application of this scheme is to encode a private key and use it to satisfy a Public Key Infrastructure (hereinafter “PKI”) challenge/response with only a biometric sample.
  • PKI Public Key Infrastructure
  • Blockchain transactions may comprise a series of block headers, for example serialized in an 80-byte format before being hashed in accordance with an algorithm. The transactions may be broadcast between peers in a serialized byte format.
  • Biometrics are a technology that use unique features of human physicality (e.g. a biometric source, such as fingerprint image, face image, iris image, hand geometry, hand/finger vein, retina image, DNA, or palm print, or a behavioral characteristic, such as a signature, a gait, or a voice sample, etc.) to create a unique digital “template” made up of biometric features that can be used by computers to help verify or identify a person. For example, a person's fingerprints have features that are statistically unique—that is, while some people may have fingerprints that generate indistinguishable features, such an occurrence is extremely rare. Biometric templates may be compared rapidly by a computer to verify that two or more biometric templates are from the same individual (verification), or to search and identify the biometrics of an individual in a large database (identification).
  • a biometric source such as fingerprint image, face image, iris image, hand geometry, hand/finger vein, retina image, DNA, or palm print
  • a behavioral characteristic such as
  • Biometric information protection is an application of various algorithms to transform a set of biometric features to a “pseudonymous identifier” (hereinafter “PI”) including obfuscated biometric data and optionally other “supplementary data” (hereinafter “SD”).
  • API represents an individual and can be verified by means of a new biometric sample.
  • a PI may not, however, contain any information that would allow retrieval of the biometric features or biometric sample used to create the PI.
  • the SD which may also be used to create the PI may be a PIN code or password.
  • the purpose of biometric information protection is to secure private biometric data in such a way to prevent source data from being extracted and used fraudulently, while enabling the source data to be used to perform biometric comparisons.
  • ISO/IEC 24745 which is incorporated herein by reference in its entirety, is an international standard that defines terms and system models for biometric information protection.
  • the creation of a PI is a one-way calculation such that the originating biometric features and supplemental data used to create the PI cannot be calculated from the PI, analogously to a hash.
  • the technology enables comparison of obfuscated biometric and supplemental data to determine if the two were derived from the same data.
  • “Auxiliary data” (hereinafter “AD”) may be created at the time of the creation of the PI and may be required to perform the comparison.
  • Auxiliary data can be subject-dependent data which may be required to reconstruct a PI during verification.
  • the PI and AD may be separated physically and logically from each other in order to reduce risks to privacy and security of the data. Physically storing the PI and AD on separate storage devices is desirable though not required.
  • the AD may comprise a secret number encrypted by a key derived from the biometric sample, or may comprise a one-way transformation or public string.
  • the disclosed systems and methods presented herein provide a way to verify and identify contributors to blockchain transactions through the use of biometric information.
  • a system may include, and a process may be performed by, a memory and processor.
  • the processor may be configured to perform the steps required by the embodiment.
  • a system may also include storage devices and secure file deletion systems.
  • Embodiments disclosed herein may comprise one or more customer devices, a network, one or more servers, and one or more databases. An overview of an embodiment of the system is illustrated in FIG. 8 .
  • a user of a client device 804 may operate and utilize the device 804 to enter a biometric sample and/or supplementary data, as discussed below.
  • the client device 804 may be in communication with a network 805 or directly in communication with a server 801 and an external storage device 803 via a communications link 802 .
  • Functions involved with performing steps of the embodiment may be performed within the server 801 .
  • the steps required for an embodiment of the system may be performed entirely within the user device 804 .
  • Server processor 807 may comprise one or more microprocessors, controllers, or other computing devices or resources interconnected via one or more communication links.
  • the processor may operate alone or in conjunction with other components or additional processor(s) of the system described herein.
  • Processor 807 may be communicatively coupled to memory 810 via an internal link 806 .
  • Memory 810 may take the form of volatile or non-volatile memory including, but not limited to, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), removable media, or any other type of memory component.
  • memory 810 may be internal or external to the processor 807 and may include instructions to perform the steps of embodiments of the system.
  • the server may further comprise a transmitter/receiver 809 used to communicate with external device, i.e. a client device 804 , an external storage device 803 and/or a network 805 as well as an internal storage device 808 .
  • the transmitter/receiver 809 may include any necessary hardware and/or software for sending data signals, control signals, etc. to and from external components and the processor 807 .
  • the transmitter/receiver 809 are configured to transmit and receive, respectively, signals via wired communications to other elements either via a circuit trace (e.g., via a PCB), an IC trace (e.g., an electrical trace or via established in an IC chip), an external wire, or the like.
  • example embodiments are not limited to the structure of the server 801 shown in FIG. 8 .
  • the server 801 may be implemented by a digital state machine comprising digital components such as logic gates.
  • the server 801 may be implemented as an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • the illustrated method proposes a means to biometrically verify the contributor of the message by enabling the contributor to use their biometric (e.g. fingerprint) to encode, store and later decode a private key, which can then be used to satisfy a cryptographic challenge/response against a public key stored in the transaction at the time of its creation.
  • the private key can only be decoded with the use of unique biometric data and optional supplemental data (e.g. PIN) from the contributor, demonstrating that the contributor is in fact the holder of the private key.
  • Verification by means of the method illustrated in FIG. 1 can be performed securely across a network using a standard PKI-based challenge/response exchange. Note that in in this method, the contributor might choose to discard the unencoded private key for extra security, or alternatively keep the original private key but use the biometrically encoded key in the event that the unencoded key is lost or stolen.
  • This method solves a critical problem with blockchain based systems that otherwise rely on secure storage, maintenance, and use of private crypto-keys that are paired with public keys stored in a blockchain transaction for the purpose of claiming association with the transaction.
  • Digital wallets are offered to help manage and protect private keys, but loss of a private key by theft, fraud, breach, computer hardware or software failure, user error, or some other means can cause a loss to the contributor to the blockchain transaction of whatever value or privileges are represented by the blockchain transaction.
  • the method proposed at least enables a contributor to use a biometrically encoded private key in place of—or as a back up to—the private key.
  • the exemplary method allows a contributor to either a) dispose of their unencoded private key, orb) preserve the unencoded private key by traditional means and use the biometrically encoded key as a backup.
  • the biometrically encoded key may be revealed (and only revealed) by submitting a biometric sample.
  • a differentiating feature of this method over other existing or more obvious methods is that the technique allows the blockchain transaction contributor to verify their association with a blockchain transaction using only their biometrics (e.g. their fingerprint) in the event their private key is lost or stolen.
  • biometrics e.g. their fingerprint
  • this method is the ability it affords to a blockchain contributor to protect their claim to the contributed transaction by a) requiring a unique biometric to reveal their private key and b) avoid storing any sensitive data (e.g. unencoded private key, raw biometric image or template data) that is of potential use and possibly accessible to a fraudster without presentation of a biometric source (e.g., fingerprint).
  • sensitive data e.g. unencoded private key, raw biometric image or template data
  • the private key is encoded in such a way that the contributor can add additional security to the encoding by requiring supplemental data such as a PIN for decoding.
  • the method involves two exemplary processes: 1) enrolment and 2) verification.
  • the enrolment process may be used to create a PI with a private key and biometric features by a contributor when making a transaction request in a transaction ledger. This PI may be stored in a secure storage and used later to verify the identity of a contributor to the transaction ledger in the verification process.
  • an enrolment biometric sample is captured 601 , biometric features are extracted 602 a and input into a PIE 604 .
  • the biometric data may be later discarded 603 for security purposes.
  • the PIE 604 is also provided a private key 605 and outputs AD and PI which are stored in a secure storage system 606 .
  • a new biometric sample is captured 607 from the user seeking verification.
  • the biometric features are extracted 602 b and later discarded 603 .
  • the biometric features and AD are input into a PIR 608 resulting in a PI′.
  • the PI and PI′ are then compared by a PIC 609 resulting in a verification decision 610 .
  • FIG. 1 An exemplary enrolment process of the embodiment is illustrated in FIG. 1 and may comprise the following subsystems: public/private key generation subsystem 101 ; biometric capture subsystem 106 ; biometric feature extractor subsystem 107 ; pseudonymous identifier encoder (PIE) subsystem 105 ; secure data storage subsystem 112 ; blockchain transaction generator subsystem 104 ; and secure file deletion subsystem 109 .
  • PIE pseudonymous identifier encoder
  • the enrolment process begins with the generation of a public/private key pair 101 , comprising a public key 102 and a private key 103 .
  • asymmetrical encryption system is created, wherein the public key 102 is intended to be generally known and or available to persons other than the contributor, while the private key 103 is intended to be kept private and known only to the contributor.
  • a number of asymmetric encryption systems may be used, for example the RSACryptoServiceProvider and DSACryptoServiceProvider provided by the .NET Framework.
  • the private key 103 after being used in the enrolment process to create a pseudonymous identifier should be either stored in a secure storage device, destroyed, or otherwise kept secret.
  • the public/private key pair 101 is used to amend and encrypt a transaction request 104 .
  • the transaction request 104 may be a transaction message or other encrypted entry in a transaction ledger.
  • SD 113 may comprise a PIN or password or some other means of securing data.
  • a biometric feature extractor 107 may be used to derive biometric features 108 from the biometric sample 106 .
  • the biometric feature extractor 107 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
  • a pseudonymous identifier encoder (hereinafter “PIE”) 105 may be used to derive a PI 110 and generate auxiliary data (hereinafter “AD”) 111 from the biometric features 108 , the private key 103 and optionally the SD 113 .
  • the PIE 105 may receive as input the biometric features 108 , the private key 103 , and optionally the SD 113 .
  • the PIE 105 utilizes an embed function 501 to combine the inputs 108 , 103 , and optionally 113 .
  • the output of the embed function 501 is then transformed through a cryptographic one-way function 502 which outputs the pseudonymous identifier 110 as well as the auxiliary data 111 .
  • a cryptographic one-way function 502 By using a one-way function 502 , the PIE should in theory be difficult to invert. Reconstructing the biometric features 108 , the private key 103 and/or the SD 113 may be possible through only brute force methods.
  • biometric sample 106 features 108 and optionally the private key 103 may be securely stored or destroyed 109 .
  • the PI 110 and AD 111 and optionally the private key 103 may be stored in a secure storage system 112 .
  • FIG. 2 An exemplary verification process of an embodiment is illustrated in FIG. 2 and may comprise the following subsystems: biometric capture subsystem 210 ; biometric feature extractor subsystem 213 ; pseudonymous identifier recoder (PIR) subsystem 204 ; pseudonymous identifier comparator (PIC) subsystem 206 ; secure data storage subsystem 201 ; secure file deletion subsystem 212 ; and PKI subsystem 208 .
  • PIR pseudonymous identifier recoder
  • PIC pseudonymous identifier comparator
  • the verification process begins with the capturing of a biometric sample 211 with a biometric capture subsystem 210 and optional Supplemental Data (SD) 218 (e.g., PIN) for verification.
  • SD Supplemental Data
  • the biometric sample may be captured via the use of a biometric capture subsystem.
  • a biometric feature extractor 213 may be used to derive biometric features 214 from the biometric sample 211 .
  • the biometric feature extractor 213 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
  • the optional SD 218 may be entered by the user seeking to be verified as contributor via a GUI of a computer device or a keypad or some other data entry device.
  • the SD 218 may comprise a PIN or password or another conventional type of user-specific data.
  • auxiliary data 203 associated with the PI 202 is obtained from the secure data storage subsystem 201 and encoded with the biometric features 214 and optionally supplemental data (hereinafter “SD”) 218 with a Pseudonymous Identifier Recoder (hereinafter “PIR”) Subsystem 204 .
  • the PIR 204 uses the AD 203 , the biometric features 214 , and optionally SD 218 to create a pseudonymous identifier prime (hereinafter “PI′”) 205 .
  • An example PIR 204 is illustrated in FIG. 5B and operates similarly to the PIE of FIG. 5A , discussed above.
  • the PIR embeds the biometric features 214 and optional 218 not with a private key, but with the auxiliary data 203 obtained from the data storage system 201 .
  • the output of the embed function 503 is input into a cryptographic one-way function 504 which outputs the PI′ 205 .
  • the PIR should in theory be difficult to invert. Reconstructing the biometric features 214 , the auxiliary data 203 and optionally the SD 218 may be possible through only brute force methods.
  • the output PI′ 205 should, if the biometric features 214 match the biometric features used in the enrolment process, match the PI 202 associated with the auxiliary data 203 .
  • the biometric sample 211 and features 214 used in the verification process may be discarded and destroyed with a secure file deletion system 212 for security purposes.
  • a pseudonymous identifier comparator (PIC) 206 may be used to compare PI 202 and PI′ 205 . With a match, the private key 207 is revealed, thus verifying the donor of the biometric sample 211 . Successful release of private key 207 encoded in PI 202 indicates that the source of biometric sample 211 verified is the same as the one used to enroll. This private key 207 may then be used to satisfy a PKI challenge through a PKI subsystem 208 resulting in a PKI challenge response result 209 .
  • FIGS. 3 and 4 A second illustrative embodiment is shown in FIGS. 3 and 4 .
  • FIG. 3 illustrates an embodiment of the enrollment process of this second illustrative embodiment.
  • FIG. 4 illustrates an embodiment of the verification process of this second illustrative embodiment.
  • This second embodiment proposes a means to biometrically verify the identity of the contributor of the transaction by enabling the contributor to use their biometrics in parallel to the aforementioned mechanism requiring PKI.
  • This method requires that the Pseudonymous Identifier (PI) 310 be stored in the blockchain transaction request, and the associated Auxiliary Data (AD) 311 be securely stored and preserved in a separate database, ideally by the blockchain database administrator.
  • PI Pseudonymous Identifier
  • AD Auxiliary Data
  • the PI 310 stored in the blockchain transaction and the separately stored AD 311 can be used to biometrically verify the identity of the contributor. This is useful if the contributor has lost their private key, or if there is a need to verify the identity of the user of the private key.
  • a live biometric sample is captured and encoded using the auxiliary data, and the result is compared to the PI in the transaction. A match demonstrates that the live biometric is from the same person who created the PI stored in the blockchain transaction. This method can be performed even if the contributor loses their private key.
  • This method solves a critical problem with blockchain based systems that otherwise rely on secure storage, maintenance, and use of private crypto-keys that are paired with public keys stored in a blockchain transaction for the purpose of claiming association with the transaction.
  • Digital wallets are offered to help manage and protect private keys. But loss of a private key by theft, fraud, breach, computer hardware or software failure, user error, or some other means can cause a loss to the contributor to the blockchain transaction of whatever value or privileges are represented by the blockchain transaction.
  • the method proposed enables a contributor to add a biometric key (Pseudonymous Identifier) to a blockchain transaction as a back up to the public key.
  • the key serves to verify the identity of the creator of the biometric key upon comparison with a live biometric sample.
  • a differentiating feature of this method over other existing or more obvious methods is that it allows the blockchain transaction contributor to verify their association with a blockchain transaction using only their biometrics (e.g. their fingerprint) in the event their private key is lost or stolen.
  • biometrics e.g. their fingerprint
  • this method is the ability it affords to a blockchain contributor to protect their claim to the contributed transaction by a) requiring a unique biometric to reveal their private key and b) avoid storing any sensitive data (e.g. unencoded private key, raw biometric image or template data) that is of potential use to a fraudster without presentation of a biometric source (e.g. fingerprint).
  • sensitive data e.g. unencoded private key, raw biometric image or template data
  • the private key is encoded in such a way that the contributor can add additional security to the encoding by requiring supplemental data such as a PIN for decoding.
  • an enrolment biometric sample is captured 611 , biometric features are extracted 612 a and input into a PIE 614 .
  • the biometric data may be discarded 613 for security purposes.
  • the PIE 614 is also provided a public key 615 and outputs AD and PI which are stored in a secure storage system 616 .
  • a new biometric sample is captured 617 from the user seeking verification.
  • the biometric features are extracted 612 b and later discarded 613 .
  • the biometric features, public key 615 and AD are input into a PIR 618 resulting in a PI′.
  • the PI and PI′ are then compared by a PIC 619 resulting in a verification decision 620 .
  • the exemplary enrolment system of the embodiment is illustrated in FIG. 3 and comprises the following subsystems:
  • PIE Pseudonymous identifier encoder
  • the enrolment process involves the following exemplary steps:
  • the enrolment process begins with the generation, by a contributor, of a public/private key pair 301 , comprising a public key 302 and a private key 303 .
  • asymmetrical encryption system is created, wherein the public key 302 is intended to be generally known and or available to persons other than the contributor, while the private key 303 is intended to be kept private and known only to the contributor.
  • the private key 303 may be destroyed or otherwise lost, as the private key 303 is not required for the verification process.
  • a number of asymmetric encryption systems may be used, including the RSACryptoServiceProvider and DSACryptoServiceProvider provided by the .NET Framework.
  • the private key 303 should be either stored in a secure storage device, destroyed, or otherwise kept secret.
  • the public/private key pair 301 is used to amend and encrypt a transaction request 313 .
  • the transaction request 313 may be a transaction message or other encrypted entry in a transaction ledger.
  • SD 313 may comprise a PIN or password or some other means of securing data.
  • a biometric feature extractor 307 may be used to derive biometric features 308 from the biometric sample 306 .
  • the biometric feature extractor 307 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem. After being used in the enrolment process, the biometric features 308 and biometric sample 306 should be securely destroyed 309 .
  • a pseudonymous identifier encoder (hereinafter “PIE”) 305 may be used to derive a PI 310 and generate auxiliary data (hereinafter “AD”) 311 from the biometric features 308 and optionally the SD 313 .
  • the PIE 305 may receive as input the biometric features 308 and optionally the SD 313 .
  • the PIE 305 utilizes an embed function 701 to combine the input biometric features 308 , public key 302 , and optionally SD 313 .
  • the output of the embed function 701 is then transformed through a cryptographic one-way function 702 which outputs the pseudonymous identifier 310 as well as the auxiliary data 311 .
  • the PIE 305 should in theory be difficult to invert. Reconstructing the biometric features 308 and/or the SD 313 may be possible through only brute force methods.
  • the PI 310 and AD 311 are used to amend transaction the transaction request 312 which is used in association with the public key 302 to digitally sign the transaction request 313 .
  • biometric sample 306 may be securely stored or destroyed 309 .
  • the PI 310 and AD 311 and optionally the private key 303 may be stored in a secure storage system 312 .
  • the exemplary verification system of the embodiment is illustrated in FIG. 4 and comprises the following subsystems: Biometric capture subsystem 407 ; Biometric feature extractor subsystem 409 ; Pseudonymous identifier recoder (PIR) subsystem 404 ; Pseudonymous identifier comparator (PIC) subsystem 406 ; Blockchain transaction reader subsystem 401 ; and Secure file deletion subsystem 411 .
  • the verification process begins with the capturing of a biometric sample 408 with a biometric capture subsystem 407 and the optional entry of Supplemental Data (SD) 418 (e.g. PIN) for verification.
  • SD Supplemental Data
  • the biometric sample 408 may be captured via the use of a biometric capture subsystem 407 .
  • a biometric feature extractor 409 may be used to derive biometric features 410 from the biometric sample 408 .
  • the biometric feature extractor 409 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
  • the optional SD 418 may be entered by the user seeking to be verified as contributor via a GUI of a computer device or a keypad or some other data entry device.
  • the SD 418 may comprise a PIN or password or other conventional type of user-specific data.
  • the public key and auxiliary data 403 associated with the PI 402 are obtained from a digitally signed transaction request 401 and may be encoded with the biometric features 410 and optionally supplemental data (hereinafter “SD”) 418 by a Pseudonymous Identifier Recoder (hereinafter “PIR”) Subsystem 404 .
  • the PIR 404 uses the public key and auxiliary data 403 , the biometric features 414 , and optionally SD 418 to create a pseudonymous identifier prime (hereinafter “PI′”) 405 .
  • An example PIR 404 is illustrated in FIG. 7B and operates similarly to the PIE of FIG. 7A , discussed above.
  • the PIR embeds the biometric features 414 , optionally the SD 418 , and the public key and auxiliary data 403 .
  • the output of the embed function 703 is input into a cryptographic one-way function 704 which outputs the PI′ 405 .
  • the PIR should in theory be difficult to invert.
  • the output PI′ 405 should, if the biometric features 414 match the biometric features used in the enrolment process, match the PI 402 associated with the public key and auxiliary data 403 .
  • the biometric sample 408 and features 410 used in the verification process may be discarded and/or destroyed with a secure file deletion system 411 for security purposes.
  • a pseudonymous identifier comparator subsystem (PIC) 406 may be used to compare PI 402 and PI′ 405 resulting in a verification decision 412 . With a match, the donor of the biometric sample 408 is verified, indicating that the source of biometric sample 408 is the same as the one used to enroll.
  • PIC pseudonymous identifier comparator subsystem
  • Exemplary aspects are directed toward:
  • the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”.
  • the terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, circuits, or the like.
  • the components of the system can be arranged at any location within a distributed network without affecting the operation of the system. It should also be appreciated that the components of the system can be combined into one or more devices, or split between devices or systems.
  • the various links (which may not be shown connecting the elements), including the communications channel(s)/link connecting the elements, can be wired or wireless links or any combination thereof, or any other known or later developed element(s) capable of supplying and/or communicating data to and from the connected elements.
  • module as used herein can refer to any known or later developed hardware, circuit, circuitry, software, firmware, or combination thereof, that is capable of performing the functionality associated with that element.
  • determine, calculate, and compute and variations thereof, as used herein are used interchangeable and include any type of methodology, process, technique, mathematical operational or protocol.
  • the systems, methods and protocols can be implemented to improve one or more of a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, any comparable means, or the like.
  • a special purpose computer a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, any comparable means, or the like.
  • any device capable of implementing a state machine that is in turn capable of implementing the methodology illustrated herein can benefit from the various communication methods, protocols and techniques according to the disclosure provided herein.
  • Examples of the processors as described herein may include, but are not limited to, at least one of Qualcomm® Qualcomm® Qualcomm® 800 and 801, Qualcomm® Qualcomm® Qualcomm® 610 and 615 with 4G LTE Integration and 64-bit computing, Apple® A7 processor with 64-bit architecture, Apple® M7 motion coprocessors, Samsung® Exynos® series, the Intel® CoreTM family of processors, the Intel® Xeon® family of processors, the Intel® AtomTM family of processors, the Intel Itanium® family of processors, Intel® Core® i5-4670K and i7-4770K 22 nm Haswell, Intel® Core® i5-3570K 22 nm Ivy Bridge, the AMD® FXTM family of processors, AMD® FX-4300, FX-6300, and FX-8350 32 nm Vishera, AMD® Kaveri processors, Texas Instruments® Jacinto C6000TM automotive infotainment processors, Texas Instruments® OMAPTM automotive-grade mobile processors, ARM® Cor
  • the disclosed methods may be readily implemented in software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms.
  • the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with the embodiments is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized.
  • the communication systems, methods and protocols illustrated herein can be readily implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the computer arts.
  • the disclosed methods may be readily implemented in software and/or firmware that can be stored on a storage medium to improve the performance of: a programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like.
  • the systems and methods can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated communication system or system component, or the like.
  • the system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system, such as the hardware and software systems of a biometric/blockchain system.
  • Various embodiments may also or alternatively be implemented fully or partially in software and/or firmware.
  • This software and/or firmware may take the form of instructions contained in or on a non-transitory computer-readable storage medium. Those instructions may then be read and executed by one or more processors to enable performance of the operations described herein.
  • the instructions may be in any suitable form, such as but not limited to source code, compiled code, interpreted code, executable code, static code, dynamic code, and the like.
  • Such a computer-readable medium may include any tangible non-transitory medium for storing information in a form readable by one or more computers, such as but not limited to read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; a flash memory, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A blockchain database employs cryptography and other methods to implement and protect a distributed, publicly-amendable ledger. Transactions in a blockchain ledger are intentionally anonymous; however, there are cases where it would be useful to be able to verify or disprove a claim of identity of a contributor of a blockchain transaction. Biometrics can be used to link a human being to digital information using their unique physical traits in a way that is analogous to a handwritten or digital signature. An exemplary embodiment disclosed herein describes methods to create and store data in a blockchain transaction such that it can be used in the future to biometrically verify the identity of the contributor of the transaction, and use encoded biometric data to determine whether the blockchain transaction was created or not created by a particular individual.

Description

CROSS REFERENCE TO RELATED APPLICATION
This application is a Continuation of U.S. application Ser. No. 15/753,879, filed Feb. 20, 2018, now U.S. Pat. No. 10,666,423, which is a national stage application under 35 U.S.C. 371 of PCT Application No. PCT/US2016/050660, filed Sep. 8, 2016, which designated the United States, which PCT application claims the benefit of and priority under 35 U.S.C. § 119(e) to U.S. Provisional Application Ser. No. 62/217,551, filed Sep. 11, 2015, of the same title, each of which are incorporated herein by reference in their entirety.
FIELD
An exemplary embodiment relates generally to a blockchain database and particularly to the use of biometrics to enroll and/or verify a blockchain database transaction contributor.
BACKGROUND
As computers and the internet progressively become more central to everyday transactions, the importance of security and privacy becomes increasingly vital. A strong and efficient authentication method is an increasingly important feature of any digital system. The use of biometrics—a way of identifying an individual based on physiological and/or behavioral characteristics—in addition to conventional methods of digital security provides an added layer of protection. Embodiments of the present disclosure address disadvantages and issues with previous methods of authenticating transactions in a blockchain ledger with improved system and methods.
An important feature of biometric information protection algorithms and schemes is the ability to encode messages within the encoded data that may be decoded only when a biometric is successfully matched to the biometric used to encode the message.
A blockchain database employs cryptography and other methods to implement and protect a transaction ledger, to which transactions can be added but not edited without detection. A transaction ledger may be public and distributed or private. Blockchain databases are highly resistant to tampering because of their cryptographic tamper detection mechanisms. A transaction ledger utilizing a blockchain database has applications in cryptocurrencies, banking, payments, smart contracts, and other applications.
While a key feature of a blockchain database is the anonymity of the humans contributing transactions, there are applications in which it may be useful to have the ability, with the cooperation of a contributor, to demonstrate the contributor's association with one or more transactions in a transaction ledger. It is also conceivable that a user may seek to repudiate a purported role as a contributor to a transaction.
Bitcoin is a payment system that serves as an example of the creation and use of a blockchain database. U.S. Patent Publication No. 2015/0262171 discusses Bitcoin and blockchain technology in detail and is expressly incorporated herein by reference in its entirety. In order to conduct bitcoin transactions, a cryptographic public/private key pair is generated by a user. The private key is held solely by the contributor (e.g. in a “wallet software”) and used to claim bitcoins. An “address” is a hash of the public key, and is noted in each bitcoin exchange, serving like an account number. A contributor may have different addresses for each transaction to enhance their anonymity in the transaction ledger. Bitcoins are passed from address to address with each transaction. The private key is also used to create a digital signature of the transaction. The public key is included in the transaction. These enable someone to verify that the contributor of the transaction is the holder of the associated private key via cryptographic challenge and response. If the private key is lost or stolen, however, the claim to a transaction may also be lost or stolen.
Transactions in a blockchain ledger are intentionally anonymous, ideally containing no personally identifiable information (hereinafter “PII”). There are cases, however, where it would be useful to be able to verify or disprove a claim of identity of a purported contributor of a blockchain transaction without requiring PII to be stored in the transaction.
Biometrics can be used to unambiguously link a human being to digital information using their unique physical traits in a way that is analogous to a handwritten signature or digital signature. Biometric data protection techniques enable this to be done in a way that anonymizes biometric data, preventing it from being useful for fraud in the event it is compromised. These techniques also enable encoding of messages that can only be decoded when a biometric match is achieved. The use of biometrics in addition to conventional, digital security methods adds an organic level of protection not possible through the use of computer processes alone.
These and other needs are addressed by the various embodiments and configurations discussed herein. One exemplary embodiment is directed generally to a blockchain database and particularly to the use of biometrics to enroll and/or verify a blockchain database transaction contributor.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosure is described in conjunction with the appended figures, which are not necessarily drawn to scale:
FIG. 1 depicts a flowchart for a method of enrolling a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 2 depicts a flowchart for a method of verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 3 depicts a flowchart for a method of enrolling a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 4 depicts a flowchart for a method of verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 5A depicts a flowchart for a method of operating a pseudonymous identifier encoder according to an embodiment of the disclosure.
FIG. 5B depicts a flowchart for a method of operating a pseudonymous identifier recoder according to an embodiment of the disclosure.
FIG. 6A depicts an overview flowchart for a method of enrolling and verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 6B depicts an overview flowchart for a method of enrolling and verifying a contributor to a blockchain transaction according to an embodiment of the disclosure.
FIG. 7A depicts a flowchart for a method of operating a pseudonymous identifier encoder according to an embodiment of the disclosure.
FIG. 7B depicts a flowchart for a method of operating a pseudonymous identifier recoder according to an embodiment of the disclosure.
FIG. 8 depicts an example structure of a system enabled to perform blockchain enrolment and verification according to at least one example embodiment.
DETAILED DESCRIPTION
The ensuing description provides embodiments only and is not intended to limit the scope, applicability, or configuration of the claims. Rather, the ensuing description will provide those skilled in the art with an enabling description for implementing the described embodiments. It being understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the appended claims.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and this disclosure.
As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprise,” “comprises,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The term “and/or” includes any and all combinations of one or more of the associated listed items.
An exemplary embodiment describes multiple methods to 1) create biometric data and store it in a blockchain transaction such that it may be used in the future to biometrically verify the identity of the contributor of the transaction, and 2) use encoded “live” biometric data to determine whether the blockchain transaction was or was not created by a particular individual. These capabilities can be achieved without including PII or transaction linking data in the blockchain transaction and can be performed in a distributed fashion over a network. One application of this scheme is to encode a private key and use it to satisfy a Public Key Infrastructure (hereinafter “PKI”) challenge/response with only a biometric sample.
Successive blockchain transactions are “chained” together cryptographically in series that form “blocks” and distributed across multiple locations. In this way, the database is rendered highly resistant to tampering. Blockchain transactions may comprise a series of block headers, for example serialized in an 80-byte format before being hashed in accordance with an algorithm. The transactions may be broadcast between peers in a serialized byte format.
Biometrics are a technology that use unique features of human physicality (e.g. a biometric source, such as fingerprint image, face image, iris image, hand geometry, hand/finger vein, retina image, DNA, or palm print, or a behavioral characteristic, such as a signature, a gait, or a voice sample, etc.) to create a unique digital “template” made up of biometric features that can be used by computers to help verify or identify a person. For example, a person's fingerprints have features that are statistically unique—that is, while some people may have fingerprints that generate indistinguishable features, such an occurrence is extremely rare. Biometric templates may be compared rapidly by a computer to verify that two or more biometric templates are from the same individual (verification), or to search and identify the biometrics of an individual in a large database (identification).
“Biometric information protection” is an application of various algorithms to transform a set of biometric features to a “pseudonymous identifier” (hereinafter “PI”) including obfuscated biometric data and optionally other “supplementary data” (hereinafter “SD”). API represents an individual and can be verified by means of a new biometric sample. A PI may not, however, contain any information that would allow retrieval of the biometric features or biometric sample used to create the PI. The SD which may also be used to create the PI may be a PIN code or password. The purpose of biometric information protection is to secure private biometric data in such a way to prevent source data from being extracted and used fraudulently, while enabling the source data to be used to perform biometric comparisons. ISO/IEC 24745, which is incorporated herein by reference in its entirety, is an international standard that defines terms and system models for biometric information protection.
The creation of a PI is a one-way calculation such that the originating biometric features and supplemental data used to create the PI cannot be calculated from the PI, analogously to a hash. The technology enables comparison of obfuscated biometric and supplemental data to determine if the two were derived from the same data. “Auxiliary data” (hereinafter “AD”) may be created at the time of the creation of the PI and may be required to perform the comparison. Auxiliary data can be subject-dependent data which may be required to reconstruct a PI during verification. The PI and AD may be separated physically and logically from each other in order to reduce risks to privacy and security of the data. Physically storing the PI and AD on separate storage devices is desirable though not required. As an example, the AD may comprise a secret number encrypted by a key derived from the biometric sample, or may comprise a one-way transformation or public string. The disclosed systems and methods presented herein provide a way to verify and identify contributors to blockchain transactions through the use of biometric information.
In at least one embodiment, a system may include, and a process may be performed by, a memory and processor. The processor may be configured to perform the steps required by the embodiment. A system may also include storage devices and secure file deletion systems.
Embodiments disclosed herein may comprise one or more customer devices, a network, one or more servers, and one or more databases. An overview of an embodiment of the system is illustrated in FIG. 8.
In particular, a user of a client device 804 may operate and utilize the device 804 to enter a biometric sample and/or supplementary data, as discussed below. The client device 804 may be in communication with a network 805 or directly in communication with a server 801 and an external storage device 803 via a communications link 802. Functions involved with performing steps of the embodiment may be performed within the server 801. Alternatively, the steps required for an embodiment of the system may be performed entirely within the user device 804.
An example environment comprising a server performing the steps of the system is illustrated in FIG. 8. Server processor 807 may comprise one or more microprocessors, controllers, or other computing devices or resources interconnected via one or more communication links. The processor may operate alone or in conjunction with other components or additional processor(s) of the system described herein.
Processor 807 may be communicatively coupled to memory 810 via an internal link 806. Memory 810 may take the form of volatile or non-volatile memory including, but not limited to, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), removable media, or any other type of memory component. In some embodiments, memory 810 may be internal or external to the processor 807 and may include instructions to perform the steps of embodiments of the system. In some embodiments the server may further comprise a transmitter/receiver 809 used to communicate with external device, i.e. a client device 804, an external storage device 803 and/or a network 805 as well as an internal storage device 808.
The transmitter/receiver 809 may include any necessary hardware and/or software for sending data signals, control signals, etc. to and from external components and the processor 807. Example embodiments contemplate that the transmitter/receiver 809 may be configured as simple output/input ports or more complex transmitter/receiver circuits having drivers and other associated circuitry, such as circuitry for wireless communication. In some embodiments, the transmitter/receiver 809 are configured to transmit and receive, respectively, signals via wired communications to other elements either via a circuit trace (e.g., via a PCB), an IC trace (e.g., an electrical trace or via established in an IC chip), an external wire, or the like.
It should be understood that example embodiments are not limited to the structure of the server 801 shown in FIG. 8. For example, the server 801 may be implemented by a digital state machine comprising digital components such as logic gates. As another example, the server 801 may be implemented as an application specific integrated circuit (ASIC).
Exemplary Method 1: Using Biometrics to Encode Private Key
Referring to FIG. 1, an illustrative embodiment of the present disclosure is shown. The illustrated method proposes a means to biometrically verify the contributor of the message by enabling the contributor to use their biometric (e.g. fingerprint) to encode, store and later decode a private key, which can then be used to satisfy a cryptographic challenge/response against a public key stored in the transaction at the time of its creation. The private key can only be decoded with the use of unique biometric data and optional supplemental data (e.g. PIN) from the contributor, demonstrating that the contributor is in fact the holder of the private key. Verification by means of the method illustrated in FIG. 1 can be performed securely across a network using a standard PKI-based challenge/response exchange. Note that in in this method, the contributor might choose to discard the unencoded private key for extra security, or alternatively keep the original private key but use the biometrically encoded key in the event that the unencoded key is lost or stolen.
This method solves a critical problem with blockchain based systems that otherwise rely on secure storage, maintenance, and use of private crypto-keys that are paired with public keys stored in a blockchain transaction for the purpose of claiming association with the transaction.
“Digital wallets” are offered to help manage and protect private keys, but loss of a private key by theft, fraud, breach, computer hardware or software failure, user error, or some other means can cause a loss to the contributor to the blockchain transaction of whatever value or privileges are represented by the blockchain transaction.
The method proposed at least enables a contributor to use a biometrically encoded private key in place of—or as a back up to—the private key. The exemplary method allows a contributor to either a) dispose of their unencoded private key, orb) preserve the unencoded private key by traditional means and use the biometrically encoded key as a backup. The biometrically encoded key may be revealed (and only revealed) by submitting a biometric sample.
A differentiating feature of this method over other existing or more obvious methods is that the technique allows the blockchain transaction contributor to verify their association with a blockchain transaction using only their biometrics (e.g. their fingerprint) in the event their private key is lost or stolen.
Further differentiating this method is the ability it affords to a blockchain contributor to protect their claim to the contributed transaction by a) requiring a unique biometric to reveal their private key and b) avoid storing any sensitive data (e.g. unencoded private key, raw biometric image or template data) that is of potential use and possibly accessible to a fraudster without presentation of a biometric source (e.g., fingerprint).
Further differentiating this method, the private key is encoded in such a way that the contributor can add additional security to the encoding by requiring supplemental data such as a PIN for decoding. The method involves two exemplary processes: 1) enrolment and 2) verification. The enrolment process may be used to create a PI with a private key and biometric features by a contributor when making a transaction request in a transaction ledger. This PI may be stored in a secure storage and used later to verify the identity of a contributor to the transaction ledger in the verification process.
An overview of the enrolment and verification processes of this embodiment is illustrated in FIG. 6A. As can be appreciated from the figure, and as discussed in more detail below, an enrolment biometric sample is captured 601, biometric features are extracted 602 a and input into a PIE 604. The biometric data may be later discarded 603 for security purposes. The PIE 604 is also provided a private key 605 and outputs AD and PI which are stored in a secure storage system 606. For verification, a new biometric sample is captured 607 from the user seeking verification. The biometric features are extracted 602 b and later discarded 603. The biometric features and AD are input into a PIR 608 resulting in a PI′. The PI and PI′ are then compared by a PIC 609 resulting in a verification decision 610.
Enrolment
An exemplary enrolment process of the embodiment is illustrated in FIG. 1 and may comprise the following subsystems: public/private key generation subsystem 101; biometric capture subsystem 106; biometric feature extractor subsystem 107; pseudonymous identifier encoder (PIE) subsystem 105; secure data storage subsystem 112; blockchain transaction generator subsystem 104; and secure file deletion subsystem 109.
The enrolment process begins with the generation of a public/private key pair 101, comprising a public key 102 and a private key 103. In effect, an asymmetrical encryption system is created, wherein the public key 102 is intended to be generally known and or available to persons other than the contributor, while the private key 103 is intended to be kept private and known only to the contributor. A number of asymmetric encryption systems may be used, for example the RSACryptoServiceProvider and DSACryptoServiceProvider provided by the .NET Framework. The private key 103, after being used in the enrolment process to create a pseudonymous identifier should be either stored in a secure storage device, destroyed, or otherwise kept secret.
The public/private key pair 101 is used to amend and encrypt a transaction request 104. The transaction request 104 may be a transaction message or other encrypted entry in a transaction ledger.
Next, a biometric sample 106 is captured and optionally Supplemental Data (hereinafter “SD”) 113 is collected. SD 113 may comprise a PIN or password or some other means of securing data. A biometric feature extractor 107 may be used to derive biometric features 108 from the biometric sample 106. The biometric feature extractor 107 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
A pseudonymous identifier encoder (hereinafter “PIE”) 105 may be used to derive a PI 110 and generate auxiliary data (hereinafter “AD”) 111 from the biometric features 108, the private key 103 and optionally the SD 113. During enrolment, the PIE 105 may receive as input the biometric features 108, the private key 103, and optionally the SD 113. As illustrated in FIG. 5A, the PIE 105 utilizes an embed function 501 to combine the inputs 108, 103, and optionally 113. The output of the embed function 501 is then transformed through a cryptographic one-way function 502 which outputs the pseudonymous identifier 110 as well as the auxiliary data 111. By using a one-way function 502, the PIE should in theory be difficult to invert. Reconstructing the biometric features 108, the private key 103 and/or the SD 113 may be possible through only brute force methods.
Finally, the biometric sample 106, features 108 and optionally the private key 103 may be securely stored or destroyed 109. The PI 110 and AD 111 and optionally the private key 103 may be stored in a secure storage system 112.
Verification
An exemplary verification process of an embodiment is illustrated in FIG. 2 and may comprise the following subsystems: biometric capture subsystem 210; biometric feature extractor subsystem 213; pseudonymous identifier recoder (PIR) subsystem 204; pseudonymous identifier comparator (PIC) subsystem 206; secure data storage subsystem 201; secure file deletion subsystem 212; and PKI subsystem 208.
The verification process begins with the capturing of a biometric sample 211 with a biometric capture subsystem 210 and optional Supplemental Data (SD) 218 (e.g., PIN) for verification.
The biometric sample, as in the enrolment process discussed above, may be captured via the use of a biometric capture subsystem. A biometric feature extractor 213 may be used to derive biometric features 214 from the biometric sample 211. The biometric feature extractor 213 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
The optional SD 218 may be entered by the user seeking to be verified as contributor via a GUI of a computer device or a keypad or some other data entry device. The SD 218 may comprise a PIN or password or another conventional type of user-specific data.
In order to create a pseudonymous identifier prime with encoded private key 205—which may be compared to the pseudonymous identifier with encoded private key 202 to verify the biometric features 214 obtained during the verification process—auxiliary data 203 associated with the PI 202 is obtained from the secure data storage subsystem 201 and encoded with the biometric features 214 and optionally supplemental data (hereinafter “SD”) 218 with a Pseudonymous Identifier Recoder (hereinafter “PIR”) Subsystem 204. The PIR 204 uses the AD 203, the biometric features 214, and optionally SD 218 to create a pseudonymous identifier prime (hereinafter “PI′”) 205.
An example PIR 204 is illustrated in FIG. 5B and operates similarly to the PIE of FIG. 5A, discussed above. The PIR, however, embeds the biometric features 214 and optional 218 not with a private key, but with the auxiliary data 203 obtained from the data storage system 201. After embedding AD 203, biometric features 214, and optionally SD 218 with the embed function 503, the output of the embed function 503 is input into a cryptographic one-way function 504 which outputs the PI′ 205. By using a one-way function 504, the PIR should in theory be difficult to invert. Reconstructing the biometric features 214, the auxiliary data 203 and optionally the SD 218 may be possible through only brute force methods. The output PI′ 205 should, if the biometric features 214 match the biometric features used in the enrolment process, match the PI 202 associated with the auxiliary data 203.
The biometric sample 211 and features 214 used in the verification process may be discarded and destroyed with a secure file deletion system 212 for security purposes.
After obtaining the PI′ 205, a pseudonymous identifier comparator (PIC) 206 may be used to compare PI 202 and PI′ 205. With a match, the private key 207 is revealed, thus verifying the donor of the biometric sample 211. Successful release of private key 207 encoded in PI 202 indicates that the source of biometric sample 211 verified is the same as the one used to enroll. This private key 207 may then be used to satisfy a PKI challenge through a PKI subsystem 208 resulting in a PKI challenge response result 209.
Exemplary Method 2: Biometric Verification as Supplement to PKI
A second illustrative embodiment is shown in FIGS. 3 and 4. FIG. 3 illustrates an embodiment of the enrollment process of this second illustrative embodiment. FIG. 4 illustrates an embodiment of the verification process of this second illustrative embodiment. This second embodiment proposes a means to biometrically verify the identity of the contributor of the transaction by enabling the contributor to use their biometrics in parallel to the aforementioned mechanism requiring PKI. This method requires that the Pseudonymous Identifier (PI) 310 be stored in the blockchain transaction request, and the associated Auxiliary Data (AD) 311 be securely stored and preserved in a separate database, ideally by the blockchain database administrator. The PI 310 stored in the blockchain transaction and the separately stored AD 311 can be used to biometrically verify the identity of the contributor. This is useful if the contributor has lost their private key, or if there is a need to verify the identity of the user of the private key. Upon an attempt to verify the identity of the contributor of the transaction, a live biometric sample is captured and encoded using the auxiliary data, and the result is compared to the PI in the transaction. A match demonstrates that the live biometric is from the same person who created the PI stored in the blockchain transaction. This method can be performed even if the contributor loses their private key.
This method solves a critical problem with blockchain based systems that otherwise rely on secure storage, maintenance, and use of private crypto-keys that are paired with public keys stored in a blockchain transaction for the purpose of claiming association with the transaction.
“Digital wallets” are offered to help manage and protect private keys. But loss of a private key by theft, fraud, breach, computer hardware or software failure, user error, or some other means can cause a loss to the contributor to the blockchain transaction of whatever value or privileges are represented by the blockchain transaction.
The method proposed enables a contributor to add a biometric key (Pseudonymous Identifier) to a blockchain transaction as a back up to the public key. The key serves to verify the identity of the creator of the biometric key upon comparison with a live biometric sample.
A differentiating feature of this method over other existing or more obvious methods is that it allows the blockchain transaction contributor to verify their association with a blockchain transaction using only their biometrics (e.g. their fingerprint) in the event their private key is lost or stolen.
Further differentiating this method is the ability it affords to a blockchain contributor to protect their claim to the contributed transaction by a) requiring a unique biometric to reveal their private key and b) avoid storing any sensitive data (e.g. unencoded private key, raw biometric image or template data) that is of potential use to a fraudster without presentation of a biometric source (e.g. fingerprint).
Further differentiating this method, the private key is encoded in such a way that the contributor can add additional security to the encoding by requiring supplemental data such as a PIN for decoding.
An overview of the enrolment and verification processes of this embodiment is illustrated in FIG. 6B. As can be appreciated from the figure, and as discussed in more detail below, an enrolment biometric sample is captured 611, biometric features are extracted 612 a and input into a PIE 614. The biometric data may be discarded 613 for security purposes. The PIE 614 is also provided a public key 615 and outputs AD and PI which are stored in a secure storage system 616. For verification, a new biometric sample is captured 617 from the user seeking verification. The biometric features are extracted 612 b and later discarded 613. The biometric features, public key 615 and AD are input into a PIR 618 resulting in a PI′. The PI and PI′ are then compared by a PIC 619 resulting in a verification decision 620.
Enrolment
The exemplary enrolment system of the embodiment is illustrated in FIG. 3 and comprises the following subsystems:
Biometric capture subsystem 306
Biometric feature extractor subsystem 307
Pseudonymous identifier encoder (PIE) subsystem 305
Secure data storage subsystem 304
Blockchain transaction generator subsystem 312
Secure file deletion subsystem 309
The enrolment process involves the following exemplary steps:
The enrolment process begins with the generation, by a contributor, of a public/private key pair 301, comprising a public key 302 and a private key 303. In effect, an asymmetrical encryption system is created, wherein the public key 302 is intended to be generally known and or available to persons other than the contributor, while the private key 303 is intended to be kept private and known only to the contributor. In this embodiment, however, the private key 303 may be destroyed or otherwise lost, as the private key 303 is not required for the verification process. A number of asymmetric encryption systems may be used, including the RSACryptoServiceProvider and DSACryptoServiceProvider provided by the .NET Framework. The private key 303 should be either stored in a secure storage device, destroyed, or otherwise kept secret.
The public/private key pair 301 is used to amend and encrypt a transaction request 313. The transaction request 313 may be a transaction message or other encrypted entry in a transaction ledger.
Next, a biometric sample 306 is captured and optionally Supplemental Data (hereinafter “SD”) 313 is collected. SD 313 may comprise a PIN or password or some other means of securing data. A biometric feature extractor 307 may be used to derive biometric features 308 from the biometric sample 306. The biometric feature extractor 307 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem. After being used in the enrolment process, the biometric features 308 and biometric sample 306 should be securely destroyed 309.
A pseudonymous identifier encoder (hereinafter “PIE”) 305 may be used to derive a PI 310 and generate auxiliary data (hereinafter “AD”) 311 from the biometric features 308 and optionally the SD 313. During enrolment, the PIE 305 may receive as input the biometric features 308 and optionally the SD 313. As illustrated in FIG. 7A, the PIE 305 utilizes an embed function 701 to combine the input biometric features 308, public key 302, and optionally SD 313. The output of the embed function 701 is then transformed through a cryptographic one-way function 702 which outputs the pseudonymous identifier 310 as well as the auxiliary data 311. By using a one-way function 702, the PIE 305 should in theory be difficult to invert. Reconstructing the biometric features 308 and/or the SD 313 may be possible through only brute force methods.
In this embodiment, the PI 310 and AD 311 are used to amend transaction the transaction request 312 which is used in association with the public key 302 to digitally sign the transaction request 313.
Finally, the biometric sample 306, features 308 and optionally the private key 303 may be securely stored or destroyed 309. The PI 310 and AD 311 and optionally the private key 303 may be stored in a secure storage system 312.
Verification
The exemplary verification system of the embodiment is illustrated in FIG. 4 and comprises the following subsystems: Biometric capture subsystem 407; Biometric feature extractor subsystem 409; Pseudonymous identifier recoder (PIR) subsystem 404; Pseudonymous identifier comparator (PIC) subsystem 406; Blockchain transaction reader subsystem 401; and Secure file deletion subsystem 411.
The verification process begins with the capturing of a biometric sample 408 with a biometric capture subsystem 407 and the optional entry of Supplemental Data (SD) 418 (e.g. PIN) for verification.
The biometric sample 408, as in the enrolment process discussed above, may be captured via the use of a biometric capture subsystem 407. A biometric feature extractor 409 may be used to derive biometric features 410 from the biometric sample 408. The biometric feature extractor 409 may comprise a series of subsystems, for example a biometric data capture subsystem (devices or sensors for collecting and converting biometric signals into biometric samples), a signal processing subsystem (a device for extracting data from biometric samples), and a data storage subsystem.
The optional SD 418 may be entered by the user seeking to be verified as contributor via a GUI of a computer device or a keypad or some other data entry device. The SD 418 may comprise a PIN or password or other conventional type of user-specific data.
In order to create a pseudonymous identifier prime 405—which may be compared to the pseudonymous identifier 402 to verify the biometric features 410 obtained during the verification process—the public key and auxiliary data 403 associated with the PI 402 are obtained from a digitally signed transaction request 401 and may be encoded with the biometric features 410 and optionally supplemental data (hereinafter “SD”) 418 by a Pseudonymous Identifier Recoder (hereinafter “PIR”) Subsystem 404. The PIR 404 uses the public key and auxiliary data 403, the biometric features 414, and optionally SD 418 to create a pseudonymous identifier prime (hereinafter “PI′”) 405.
An example PIR 404 is illustrated in FIG. 7B and operates similarly to the PIE of FIG. 7A, discussed above. The PIR, however, embeds the biometric features 414, optionally the SD 418, and the public key and auxiliary data 403. After embedding the public key and auxiliary data 403, biometric features 414, and optionally the SD 418 with the embed function 703, the output of the embed function 703 is input into a cryptographic one-way function 704 which outputs the PI′ 405. By using a one-way function 704, the PIR should in theory be difficult to invert. Reconstructing the biometric features 414, the public key and auxiliary data 403 and optionally the SD 418 may be possible through only brute force methods. The output PI′ 405 should, if the biometric features 414 match the biometric features used in the enrolment process, match the PI 402 associated with the public key and auxiliary data 403.
The biometric sample 408 and features 410 used in the verification process may be discarded and/or destroyed with a secure file deletion system 411 for security purposes.
After obtaining the PI′ 405, a pseudonymous identifier comparator subsystem (PIC) 406 may be used to compare PI 402 and PI′ 405 resulting in a verification decision 412. With a match, the donor of the biometric sample 408 is verified, indicating that the source of biometric sample 408 is the same as the one used to enroll.
Exemplary aspects are directed toward:
    • A method of enrolling a contributor to a blockchain transaction, the method comprising:
      • generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
      • obtaining a first biometric sample;
      • generating a first set of biometric features from the first biometric sample;
      • generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the private key;
      • using the public key to amend a blockchain transaction request; and
      • verifying the blockchain transaction request by retrieving the private key, wherein the private key is retrieved by obtaining a second biometric sample and decoding the pseudonymous identifier with a second set of biometric features generated from the second biometric sample.
    • Any of the above aspects, further comprising:
      • determining the first set of biometric features matches the second set of biometric features; and
      • based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, wherein determining the first set of biometric features matches the second set of biometric features comprises:
      • generating a pseudonymous identifier prime, comprising using a pseudonymous identifier recoder to embed the second set of biometric features with the auxiliary data; and
      • comparing the pseudonymous identifier prime with the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the private key and a first supplemental data.
    • Any of the above aspects, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the auxiliary data and a second supplemental data.
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • after determining the pseudonymous identifier prime matches the pseudonymous identifier, releasing the private key.
    • A method of enrolling a contributor to a blockchain transaction, the method comprising:
      • generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
      • obtaining a first biometric sample;
      • generating a first set of biometric features from the first biometric sample;
      • generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the public key;
      • amending a blockchain transaction request with one or more of the pseudonymous identifier and auxiliary data;
      • using the public key to sign the blockchain transaction request;
      • verifying the blockchain transaction request by:
        • obtaining a second biometric sample,
        • generating a second set of biometric features from the second biometric sample;
        • generating a pseudonymous identifier prime from the second set of biometric features; and
        • comparing the pseudonymous identifier with the pseudonymous identifier prime.
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier matches the pseudonymous identifier prime; and
      • based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, wherein determining the pseudonymous identifier matches the pseudonymous identifier prime comprises using a pseudonymous identifier recoder to embed the second set of biometric features with the public key and auxiliary data.
    • Any of the above aspects, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the public key and a first supplemental data.
    • Any of the above aspects, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the public key, the auxiliary data and a second supplemental data
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • after determining the pseudonymous identifier prime matches the pseudonymous identifier, making a verification decision.
    • A system for enrolling a contributor to a blockchain transaction, the system comprising:
      • a server comprising:
        • a memory;
        • a processor in communication with the memory, wherein the processor:
          • generates a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
          • obtains a first biometric sample;
          • generates a first set of biometric features from the first biometric sample;
          • generates a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the private key;
          • uses the public key to amend a blockchain transaction request; and
          • verifies the blockchain transaction request by retrieving the private key, wherein the private key is retrieved by obtaining a second biometric sample and decoding the pseudonymous identifier with a second set of biometric features generated from the second biometric sample.
    • Any of the above aspects, wherein the processor:
      • determines the first set of biometric features matches the second set of biometric features; and
      • based on the determination, verifies an identity of the contributor.
    • Any of the above aspects, wherein verifying the identity comprises the processor:
      • generating a pseudonymous identifier prime, comprising using a pseudonymous identifier recoder to embed the second set of biometric features with the auxiliary data; and
      • comparing the pseudonymous identifier prime with the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the private key and a first supplemental data
    • Any of the above aspects, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the auxiliary data and a second supplemental data.
    • A system for enrolling a contributor to a blockchain transaction, the system comprising:
    • means for generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
    • means for obtaining a first biometric sample;
    • means for generating a first set of biometric features from the first biometric sample;
    • means for generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the private key;
    • means for using the public key to amend a blockchain transaction request; and
    • means for verifying the blockchain transaction request by retrieving the private key, wherein the private key is retrieved by obtaining a second biometric sample and decoding the pseudonymous identifier with a second set of biometric features generated from the second biometric sample.
    • Any of the above aspects, further comprising:
      • means for determining the first set of biometric features matches the second set of biometric features; and
      • means for, based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, wherein determining the first set of biometric features matches the second set of biometric features comprises:
      • means for generating a pseudonymous identifier prime, comprising using a pseudonymous identifier recoder to embed the second set of biometric features with the auxiliary data; and
      • means for comparing the pseudonymous identifier prime with the pseudonymous identifier.
    • Any of the above aspects, further comprising means for embedding the first set of biometric features with the private key and a first supplemental data.
    • Any of the above aspects, further comprising means for using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, further comprising means for embedding the second set of biometric features with the auxiliary data and a second supplemental data.
    • Any of the above aspects, further comprising:
      • means for determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • means for, after determining the pseudonymous identifier prime matches the pseudonymous identifier, releasing the private key.
    • A system for enrolling a contributor to a blockchain transaction, the system comprising:
      • means for generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
      • means for obtaining a first biometric sample;
      • means for generating a first set of biometric features from the first biometric sample;
      • means for generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the public key;
      • means for amending a blockchain transaction request with one or more of the pseudonymous identifier and auxiliary data;
      • means for using the public key to sign the blockchain transaction request;
      • means for verifying the blockchain transaction request comprising:
        • means for obtaining a second biometric sample,
        • means for generating a second set of biometric features from the second biometric sample;
        • means for generating a pseudonymous identifier prime from the second set of biometric features; and
        • means for comparing the pseudonymous identifier with the pseudonymous identifier prime.
    • Any of the above aspects, further comprising:
      • means for determining the pseudonymous identifier matches the pseudonymous identifier prime; and
      • means for, based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, further comprising means for using a pseudonymous identifier recoder to embed the second set of biometric features with the public key and auxiliary data.
    • Any of the above aspects, further comprising means for embedding the first set of biometric features with the public key and a first supplemental data.
    • Any of the above aspects, further comprising means for using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, further comprising means for embedding the second set of biometric features with the public key, the auxiliary data and a second supplemental data
    • Any of the above aspects, further comprising:
      • means for determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • means for, after determining the pseudonymous identifier prime matches the pseudonymous identifier, making a verification decision.
    • A computer readable program product comprising:
      • a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured, when executed by a processor to perform the steps of:
        • generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
        • obtaining a first biometric sample;
        • generating a first set of biometric features from the first biometric sample;
        • generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the private key;
        • using the public key to amend a blockchain transaction request; and
        • verifying the blockchain transaction request by retrieving the private key, wherein the private key is retrieved by obtaining a second biometric sample and decoding the pseudonymous identifier with a second set of biometric features generated from the second biometric sample.
    • Any of the above aspects, further comprising:
      • determining the first set of biometric features matches the second set of biometric features; and
      • based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, wherein determining the first set of biometric features matches the second set of biometric features comprises:
      • generating a pseudonymous identifier prime, comprising using a pseudonymous identifier recoder to embed the second set of biometric features with the auxiliary data; and
      • comparing the pseudonymous identifier prime with the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the private key and a first supplemental data.
    • Any of the above aspects, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the auxiliary data and a second supplemental data.
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • after determining the pseudonymous identifier prime matches the pseudonymous identifier, releasing the private key.
    • A computer readable program product comprising:
      • a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code configured, when executed by a processor to perform the steps of:
      • generating a public/private key pair, wherein the public/private key pair comprises a public key and a private key;
      • obtaining a first biometric sample;
      • generating a first set of biometric features from the first biometric sample;
      • generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with the public key;
      • amending a blockchain transaction request with one or more of the pseudonymous identifier and auxiliary data;
      • using the public key to sign the blockchain transaction request;
      • verifying the blockchain transaction request by:
        • obtaining a second biometric sample,
        • generating a second set of biometric features from the second biometric sample;
        • generating a pseudonymous identifier prime from the second set of biometric features; and
        • comparing the pseudonymous identifier with the pseudonymous identifier prime.
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier matches the pseudonymous identifier prime; and
      • based on the determination, verifying an identity of the contributor.
    • Any of the above aspects, wherein determining the pseudonymous identifier matches the pseudonymous identifier prime comprises using a pseudonymous identifier recoder to embed the second set of biometric features with the public key and auxiliary data.
    • Any of the above aspects, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the public key and a first supplemental data.
    • Any of the above aspects, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
    • Any of the above aspects, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the public key, the auxiliary data and a second supplemental data
    • Any of the above aspects, further comprising:
      • determining the pseudonymous identifier prime matches the pseudonymous identifier; and
      • after determining the pseudonymous identifier prime matches the pseudonymous identifier, making a verification decision.
    • Any one or more of the aspects as substantially described herein.
In this description, numerous specific details are set forth in order to provide a thorough understanding of the disclosed techniques. However, it will be understood by those skilled in the art that the present techniques may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present disclosure.
Although embodiments are not limited in this regard, discussions utilizing terms such as, for example, “processing,” “computing,” “calculating,” “determining,” “establishing,” “analyzing,” “checking,” or the like, may refer to operation(s) and/or process(es) of a computer, a computing platform, a computing system, a communication system or subsystem, or other electronic computing device, that manipulate and/or transform data represented as physical (e.g., electronic) quantities within the computer's registers and/or memories into other data similarly represented as physical quantities within the computer's registers and/or memories or other information storage medium that may store instructions to perform operations and/or processes.
Although embodiments are not limited in this regard, the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”. The terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, circuits, or the like.
It may be advantageous to set forth definitions of certain words and phrases used throughout this document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or,” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, interconnected with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, such a device may be implemented in hardware, circuitry, firmware or software, or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this document and those of ordinary skill in the art should understand that in many, if not most instances, such definitions apply to prior, as well as future uses of such defined words and phrases.
For purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the present techniques. It should be appreciated however that the present disclosure may be practiced in a variety of ways beyond the specific details set forth herein. Furthermore, while the exemplary embodiments illustrated herein show various components of the system collocated, it is to be appreciated that the various components of the system can be located at distant portions of a distributed network, such as a communications network, node, within a Domain Master, and/or the Internet, or within a dedicated secured, unsecured, and/or encrypted system and/or within a network operation or management device that is located inside or outside the network. As will be appreciated from the description, and for reasons of computational efficiency, the components of the system can be arranged at any location within a distributed network without affecting the operation of the system. It should also be appreciated that the components of the system can be combined into one or more devices, or split between devices or systems.
Furthermore, it should be appreciated that the various links (which may not be shown connecting the elements), including the communications channel(s)/link connecting the elements, can be wired or wireless links or any combination thereof, or any other known or later developed element(s) capable of supplying and/or communicating data to and from the connected elements. The term module as used herein can refer to any known or later developed hardware, circuit, circuitry, software, firmware, or combination thereof, that is capable of performing the functionality associated with that element. The terms determine, calculate, and compute and variations thereof, as used herein are used interchangeable and include any type of methodology, process, technique, mathematical operational or protocol.
For purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the present embodiments. It should be appreciated however that the techniques herein may be practiced in a variety of ways beyond the specific details set forth herein.
While the above-described flowcharts have been discussed in relation to a particular sequence of events, it should be appreciated that changes to this sequence can occur without materially effecting the operation of the embodiment(s). Additionally, the exact sequence of events need not occur as set forth in the exemplary embodiments. Additionally, the exemplary techniques illustrated herein are not limited to the specifically illustrated embodiments but can also be utilized with the other exemplary embodiments and each described feature is individually and separately claimable.
Additionally, the systems, methods and protocols can be implemented to improve one or more of a special purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element(s), an ASIC or other integrated circuit, a digital signal processor, a hard-wired electronic or logic circuit such as discrete element circuit, a programmable logic device such as PLD, PLA, FPGA, PAL, any comparable means, or the like. In general, any device capable of implementing a state machine that is in turn capable of implementing the methodology illustrated herein can benefit from the various communication methods, protocols and techniques according to the disclosure provided herein.
Examples of the processors as described herein may include, but are not limited to, at least one of Qualcomm® Snapdragon® 800 and 801, Qualcomm ® Snapdragon® 610 and 615 with 4G LTE Integration and 64-bit computing, Apple® A7 processor with 64-bit architecture, Apple® M7 motion coprocessors, Samsung® Exynos® series, the Intel® Core™ family of processors, the Intel® Xeon® family of processors, the Intel® Atom™ family of processors, the Intel Itanium® family of processors, Intel® Core® i5-4670K and i7-4770K 22 nm Haswell, Intel® Core® i5-3570K 22 nm Ivy Bridge, the AMD® FX™ family of processors, AMD® FX-4300, FX-6300, and FX-8350 32 nm Vishera, AMD® Kaveri processors, Texas Instruments® Jacinto C6000™ automotive infotainment processors, Texas Instruments® OMAP™ automotive-grade mobile processors, ARM® Cortex™-M processors, ARM® Cortex-A and ARM926EJ-S™ processors, Broadcom® AirForce BCM4704/BCM4703 wireless networking processors, the AR7100 Wireless Network Processing Unit, other industry-equivalent processors, and may perform computational functions using any known or future-developed standard, instruction set, libraries, and/or architecture.
Furthermore, the disclosed methods may be readily implemented in software using object or object-oriented software development environments that provide portable source code that can be used on a variety of computer or workstation platforms. Alternatively, the disclosed system may be implemented partially or fully in hardware using standard logic circuits or VLSI design. Whether software or hardware is used to implement the systems in accordance with the embodiments is dependent on the speed and/or efficiency requirements of the system, the particular function, and the particular software or hardware systems or microprocessor or microcomputer systems being utilized. The communication systems, methods and protocols illustrated herein can be readily implemented in hardware and/or software using any known or later developed systems or structures, devices and/or software by those of ordinary skill in the applicable art from the functional description provided herein and with a general basic knowledge of the computer arts.
Moreover, the disclosed methods may be readily implemented in software and/or firmware that can be stored on a storage medium to improve the performance of: a programmed general-purpose computer with the cooperation of a controller and memory, a special purpose computer, a microprocessor, or the like. In these instances, the systems and methods can be implemented as program embedded on personal computer such as an applet, JAVA® or CGI script, as a resource residing on a server or computer workstation, as a routine embedded in a dedicated communication system or system component, or the like. The system can also be implemented by physically incorporating the system and/or method into a software and/or hardware system, such as the hardware and software systems of a biometric/blockchain system.
Various embodiments may also or alternatively be implemented fully or partially in software and/or firmware. This software and/or firmware may take the form of instructions contained in or on a non-transitory computer-readable storage medium. Those instructions may then be read and executed by one or more processors to enable performance of the operations described herein. The instructions may be in any suitable form, such as but not limited to source code, compiled code, interpreted code, executable code, static code, dynamic code, and the like. Such a computer-readable medium may include any tangible non-transitory medium for storing information in a form readable by one or more computers, such as but not limited to read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; a flash memory, etc.
While the embodiments have been described in conjunction with a number of embodiments, it is evident that many alternatives, modifications and variations would be or are apparent to those of ordinary skill in the applicable arts. Accordingly, this disclosure is intended to embrace all such alternatives, modifications, equivalents and variations that are within the spirit and scope of this disclosure.

Claims (14)

The invention claimed is:
1. A method comprising:
generating a first set of biometric features from a first biometric sample;
generating a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with a public key;
amending a blockchain transaction request with one or more of the pseudonymous identifier and auxiliary data;
using the public key to sign the blockchain transaction request;
verifying the blockchain transaction request by:
obtaining a second biometric sample,
generating a second set of biometric features from the second biometric sample;
generating a pseudonymous identifier prime from the second set of biometric features; and
comparing the pseudonymous identifier with the pseudonymous identifier prime.
2. The method of claim 1, further comprising:
determining whether the pseudonymous identifier matches the pseudonymous identifier prime; and
based on the determination, verifying an identity of a contributor.
3. The method of claim 2, wherein determining whether the pseudonymous identifier matches the pseudonymous identifier prime comprises using a pseudonymous identifier recoder to embed the second set of biometric features with the public key and auxiliary data.
4. The method of claim 1, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the public key and a first supplemental data.
5. The method of claim 1, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
6. The method of claim 3, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the public key, the auxiliary data and a second supplemental data.
7. The method of claim 3, further comprising:
determining whether the pseudonymous identifier prime matches the pseudonymous identifier; and
after determining the pseudonymous identifier prime matches the pseudonymous identifier, making a verification decision.
8. A system comprising:
at least one memory that stores computer-executable instructions; and
at least one processor configured to access the at least one memory, wherein the at least one processor is configured to execute the computer-executable instructions to:
generate a first set of biometric features from a first biometric sample;
generate a pseudonymous identifier and auxiliary data, comprising using a pseudonymous identifier encoder to embed the first set of biometric features with a public key;
amend a blockchain transaction request with one or more of the pseudonymous identifier and auxiliary data;
use the public key to sign the blockchain transaction request;
verify the blockchain transaction request by:
obtaining a second biometric sample,
generating a second set of biometric features from the second biometric sample;
generating a pseudonymous identifier prime from the second set of biometric features; and
comparing the pseudonymous identifier with the pseudonymous identifier prime.
9. The system of claim 8, further comprising instruction to:
determine whether the pseudonymous identifier matches the pseudonymous identifier prime; and
based on the determination, verify an identity of a contributor.
10. The system of claim 9, wherein determining whether the pseudonymous identifier matches the pseudonymous identifier prime comprises using a pseudonymous identifier recoder to embed the second set of biometric features with the public key and auxiliary data.
11. The system of claim 8, wherein the pseudonymous identifier encoder further embeds the first set of biometric features with the public key and a first supplemental data.
12. The system of claim 8, wherein generating the pseudonymous identifier further comprises using a one-way function to cryptographically secure the pseudonymous identifier.
13. The system of claim 10, wherein the pseudonymous identifier recoder further embeds the second set of biometric features with the public key, the auxiliary data and a second supplemental data.
14. The system of claim 10, further comprising instruction to:
determine whether the pseudonymous identifier prime matches the pseudonymous identifier; and
after determining the pseudonymous identifier prime matches the pseudonymous identifier, make a verification decision.
US16/854,103 2015-09-11 2020-04-21 Biometric verification of a blockchain database transaction contributor Active US11108546B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/854,103 US11108546B2 (en) 2015-09-11 2020-04-21 Biometric verification of a blockchain database transaction contributor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201562217551P 2015-09-11 2015-09-11
PCT/US2016/050660 WO2017044554A1 (en) 2015-09-11 2016-09-08 Biometric verification of a blockchain database transaction contributor
US201815753879A 2018-02-20 2018-02-20
US16/854,103 US11108546B2 (en) 2015-09-11 2020-04-21 Biometric verification of a blockchain database transaction contributor

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US15/753,879 Continuation US10666423B2 (en) 2015-09-11 2016-09-08 Biometric verification of a blockchain database transaction contributor
PCT/US2016/050660 Continuation WO2017044554A1 (en) 2015-09-11 2016-09-08 Biometric verification of a blockchain database transaction contributor

Publications (2)

Publication Number Publication Date
US20200252203A1 US20200252203A1 (en) 2020-08-06
US11108546B2 true US11108546B2 (en) 2021-08-31

Family

ID=56959048

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/753,879 Active 2037-03-16 US10666423B2 (en) 2015-09-11 2016-09-08 Biometric verification of a blockchain database transaction contributor
US16/854,103 Active US11108546B2 (en) 2015-09-11 2020-04-21 Biometric verification of a blockchain database transaction contributor

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/753,879 Active 2037-03-16 US10666423B2 (en) 2015-09-11 2016-09-08 Biometric verification of a blockchain database transaction contributor

Country Status (3)

Country Link
US (2) US10666423B2 (en)
EP (1) EP3348019A1 (en)
WO (1) WO2017044554A1 (en)

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9185095B1 (en) 2012-03-20 2015-11-10 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
US10979410B1 (en) 2015-05-04 2021-04-13 United Services Automobile Association (Usaa) Systems and methods for utilizing cryptology with virtual ledgers in support of transactions and agreements
US10666423B2 (en) 2015-09-11 2020-05-26 Aware, Inc. Biometric verification of a blockchain database transaction contributor
EP3234878A1 (en) * 2015-10-14 2017-10-25 Cambridge Blockchain, LLC Systems and methods for managing digital identities
US11032286B1 (en) 2015-12-02 2021-06-08 United Services Automobile Association (Usaa) Block chain authentication systems and methods
US11087401B1 (en) * 2016-02-14 2021-08-10 Mark Lawrence Method and apparatus to crowd bootstrap startups
US10454677B1 (en) 2016-02-24 2019-10-22 United Services Automobile Associate (USAA) Cryptographic key generation from biometric data
US9985964B2 (en) * 2016-03-28 2018-05-29 Black Gold Coin, Inc. Systems and methods for providing block chain-based multifactor personal identity verification
US11829998B2 (en) 2016-06-07 2023-11-28 Cornell University Authenticated data feed for blockchains
US11854011B1 (en) 2016-07-11 2023-12-26 United Services Automobile Association (Usaa) Identity management framework
US11900455B1 (en) 2016-09-18 2024-02-13 Mark Lawrence Method and apparatus for decentralized VC funds
US10516538B2 (en) * 2016-11-01 2019-12-24 Netcomm Inc. System and method for digitally signing documents using biometric data in a blockchain or PKI
EP3321846A1 (en) * 2016-11-15 2018-05-16 Mastercard International Incorporated Systems and methods for secure biometric sample raw data storage
US20210264426A1 (en) 2017-01-25 2021-08-26 State Farm Mutual Automobile Insurance Company Blockchain based asset access
US9992022B1 (en) 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
US10810290B2 (en) * 2017-03-05 2020-10-20 Ronald H Minter Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates
US10762479B2 (en) * 2017-04-05 2020-09-01 Samsung Sds Co., Ltd. Method and system for processing blockchain-based real-time transaction
US10762506B1 (en) 2017-05-11 2020-09-01 United Services Automobile Association Token device for distributed ledger based interchange
CN111880746A (en) 2017-05-25 2020-11-03 创新先进技术有限公司 Method and device for writing service data into block chain system
EP3416334B1 (en) * 2017-06-15 2020-01-15 Accenture Global Solutions Limited Portable biometric identity on a distributed data storage layer
CN107545414B (en) * 2017-07-17 2020-09-25 招商银行股份有限公司 Anonymous transaction method, device and computer readable storage medium
US10476879B2 (en) 2017-07-26 2019-11-12 International Business Machines Corporation Blockchain authentication via hard/soft token verification
US11018870B2 (en) 2017-08-10 2021-05-25 Visa International Service Association Biometric verification process using certification token
US10805085B1 (en) 2017-08-24 2020-10-13 United Services Automobile Association (Usaa) PKI-based user authentication for web services using blockchain
US10970690B2 (en) * 2017-09-12 2021-04-06 Northwestern University Blockchain distribution network with service transparency
CN110233739B (en) * 2017-11-15 2020-12-18 财付通支付科技有限公司 Identity management method, identity management device and storage medium
US9990504B1 (en) 2017-12-18 2018-06-05 Northern Trust Corporation Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
DE102018000471A1 (en) * 2018-01-22 2019-07-25 Giesecke+Devrient Mobile Security Gmbh Blockchain-based identity system
CN108305058B (en) * 2018-02-11 2021-03-02 深圳市图灵奇点智能科技有限公司 Auxiliary expense settlement method and device based on Internet of things and terminal node
WO2019177298A1 (en) * 2018-03-15 2019-09-19 Samsung Electronics Co., Ltd. Method and apparatus for managing user authentication in a blockchain network
US10958642B2 (en) 2018-04-05 2021-03-23 The Toronto-Dominion Bank Dynamic biometric authentication based on distributed ledger data
CN108769145A (en) * 2018-05-11 2018-11-06 北京奇虎科技有限公司 A kind of resources contribution amount method of proof, apparatus and system
CN108769038B (en) * 2018-06-04 2020-07-28 立旃(上海)科技有限公司 Data processing method and device based on block chain
CN108846753B (en) * 2018-06-06 2021-11-09 北京京东尚科信息技术有限公司 Method and apparatus for processing data
US11244316B2 (en) 2018-06-07 2022-02-08 International Business Machines Corporation Biometric token for blockchain
US11196551B2 (en) 2018-06-27 2021-12-07 International Business Machines Corporation Automated task management on a blockchain based on predictive and analytical analysis
US20200013055A1 (en) * 2018-07-09 2020-01-09 Environmental Financial Products, LLC Systems and Methods for Blockchain Based Identity Verification and Transaction Processing
US20200027169A1 (en) * 2018-07-21 2020-01-23 Renato Valencia Blockchain-enabled double entry recordkeeping system and method of implementing the same
CN109189782A (en) * 2018-08-02 2019-01-11 哈尔滨工程大学 A kind of indexing means in block chain commodity transaction inquiry
KR102511365B1 (en) * 2018-08-24 2023-03-17 삼성전자주식회사 Method and apparatus for biometrics
DE102018007628A1 (en) 2018-09-26 2020-03-26 Giesecke+Devrient Mobile Security Gmbh Decentralized identity management solution
CN109272317A (en) * 2018-09-27 2019-01-25 北京金山安全软件有限公司 Block chain private key obtaining method and device and electronic equipment
EP3637345A1 (en) * 2018-10-10 2020-04-15 Siemens Aktiengesellschaft Linking of identities in a distributed database
US11263630B2 (en) 2018-10-12 2022-03-01 Blackberry Limited Method and system for single purpose public keys for public ledgers
CN109359691B (en) * 2018-10-24 2020-11-06 全链通有限公司 Identity verification method and system based on block chain
US11151236B2 (en) * 2018-12-20 2021-10-19 International Business Machines Corporation File verification database system
US11139960B2 (en) * 2018-12-20 2021-10-05 International Business Machines Corporation File redaction database system
US11025430B2 (en) * 2018-12-20 2021-06-01 International Business Machines Corporation File provenance database system
CN109660346B (en) * 2019-01-16 2021-09-17 中钞信用卡产业发展有限公司杭州区块链技术研究院 Information hosting method, device, equipment and computer storage medium
TWI704794B (en) * 2019-03-29 2020-09-11 區塊科技股份有限公司 System and implement method for signing and verifying contract in a block chain network
US20200320458A1 (en) * 2019-04-04 2020-10-08 Sony Corporation System, method, and computer-readable medium for tracking information exchange
US10521652B1 (en) * 2019-04-25 2019-12-31 Alclear, Llc Enhancing capabilities by cooperatively using identity systems and identification databases
CN112152982B (en) * 2019-06-28 2022-01-07 华为技术有限公司 Processing method, device and medium of block chain information
CN110532290B (en) * 2019-07-25 2023-05-12 深圳壹账通智能科技有限公司 Information verification device, method and storage medium based on block chain
CN110601853B (en) * 2019-09-17 2021-05-11 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment
CN110795501A (en) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for creating verifiable statement based on block chain
EP3777006B1 (en) * 2019-11-29 2022-08-24 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and devices for cryptographic key management based on blockchain system
CN111538786B (en) * 2020-04-24 2021-01-05 上海简苏网络科技有限公司 Block chain data desensitization and tracing storage method and device
US11803849B1 (en) 2020-07-30 2023-10-31 Mark Lawrence Method and apparatus for decentralized micro businesses
US11836688B1 (en) 2020-08-04 2023-12-05 Mark Lawrence Method and apparatus to tokenize natural resources
KR20220133533A (en) * 2021-03-25 2022-10-05 삼성전자주식회사 Electronic device for managing secure data through decentralized network and operating mehtod thereof
WO2023066374A1 (en) * 2021-10-21 2023-04-27 墨奇科技(北京)有限公司 Privacy protection based image processing method, identity registration method, and identity authentication method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401206B1 (en) 1997-03-06 2002-06-04 Skylight Software, Inc. Method and apparatus for binding electronic impressions made by digital identities to documents
US20090013191A1 (en) * 2007-07-05 2009-01-08 Honeywell International, Inc. Multisystem biometric token
US20150244690A1 (en) 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
US20150262171A1 (en) 2014-03-17 2015-09-17 Coinbase, Inc. Bitcoin private key splitting for cold storage
US20190013931A1 (en) 2015-09-11 2019-01-10 Aware, Inc. Biometric verification of a blockchain database transaction contributor

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401206B1 (en) 1997-03-06 2002-06-04 Skylight Software, Inc. Method and apparatus for binding electronic impressions made by digital identities to documents
US20090013191A1 (en) * 2007-07-05 2009-01-08 Honeywell International, Inc. Multisystem biometric token
US9237018B2 (en) 2007-07-05 2016-01-12 Honeywell International Inc. Multisystem biometric token
US20150244690A1 (en) 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
US20150262171A1 (en) 2014-03-17 2015-09-17 Coinbase, Inc. Bitcoin private key splitting for cold storage
US20150262172A1 (en) 2014-03-17 2015-09-17 Coinbase, Inc. User private key control
US20190013931A1 (en) 2015-09-11 2019-01-10 Aware, Inc. Biometric verification of a blockchain database transaction contributor

Non-Patent Citations (16)

* Cited by examiner, † Cited by third party
Title
Antonopoulos, Andreas M. "Mastering Bitcoin: Unlocking Digital Cryptocurrencies" O'Reilly Media; Dec. 1, 2014 (298 pages).
Breebaart, Jeroen et al. "A Reference Architecture for Biometric Template Protection Based on Pseudo Identities" BIOSIG 2008; Biometrics and Electronic Signatures; 2008.
Breebaart, Jeroen et al. "Biometric Template Protection" Datenschutz und Datensicherheit—DuD 33.5 (2009); pp. 299-304.
Buchmann, Nicolas et al. "Security Considerations on Extending PACE to a Biometric-Based Connection Establishment" International Conference of the BIOSIG Special Interest Group (BIOSIG); IEEE; 2013.
Buchmann, Nicolas, et al. "Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area." Annual Privacy Forum. Springer, Cham, 2014. (Year: 2014). *
International Preliminary Report on Patentability for International Application No. PCT/US2016/050660, dated Mar. 22, 2018.
International Search Report for International Application No. PCT/US2016/050660, dated Dec. 13, 2016.
International Standard ISO/IEC 24745 Information Technology—Security Techniques—Biometric Information Protection: Jun. 15, 2011 (58 pages).
Ken Shirrifi's Blog "Bitcoins the Hard Way: Using the Raw Bitcoin Protocol" Available at http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html, Feb. 2014.
Kevenaar, Tom et al. "A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems" BIOSIG 2010; Biometrics and Electronic Signatures; Proceedings of the Special Interest Group on Biometrics and Electronic Signatures; 2010.
N. Delvaux et al., "Pseudo Identities Based on Fingerprint Characteristics," 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008, pp. 1063-1068, doi: 10.1109/IIH-MSP.2008.327. (Year: 2008). *
Notice of Allowance for U.S. Appl. No. 15/753,879 dated Jan. 29, 2020.
Office Action for European Application No. 16767457.1, dated Dec. 18, 2020.
Office Action for European Application No. 16767457.1, dated Nov. 8, 2019.
Office Action for U.S. Appl. No. 15/753,879 dated Nov. 26, 2019.
Written Opinion for International Application No. PCT/US2016/050660, dated Dec. 13, 2016.

Also Published As

Publication number Publication date
US20200252203A1 (en) 2020-08-06
EP3348019A1 (en) 2018-07-18
US10666423B2 (en) 2020-05-26
US20190013931A1 (en) 2019-01-10
WO2017044554A1 (en) 2017-03-16

Similar Documents

Publication Publication Date Title
US11108546B2 (en) Biometric verification of a blockchain database transaction contributor
US10680808B2 (en) 1:N biometric authentication, encryption, signature system
US10594688B2 (en) Privacy-enhanced biometrics-secret binding scheme
EP3257194B1 (en) Systems and methods for securely managing biometric data
US9935947B1 (en) Secure and reliable protection and matching of biometric templates across multiple devices using secret sharing
JP4938678B2 (en) Secure calculation of similarity measures
JP2019057271A (en) Systems and methods for realizing block chain-based multifactor personal identity verification
US9218473B2 (en) Creation and authentication of biometric information
US20130088327A1 (en) Template delivery type cancelable biometric authentication system and method therefor
JP2009064202A (en) Authentication server, client terminal, biometric authentication system and method, and program
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
KR20180003113A (en) Server, device and method for authenticating user
CN111541713A (en) Identity authentication method and device based on block chain and user signature
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
KR101077975B1 (en) Method of generating fuzzy vault based on biometric information and verifying user's indentification using fuzzy vault
Aanjanadevi et al. Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics.
Velciu et al. Bio-cryptographic authentication in cloud storage sharing
CN104751042A (en) Credibility detection method based on password hash and biometric feature recognition
JP6151627B2 (en) Biometric authentication system, biometric authentication method, and computer program
CN116112242A (en) Unified safety authentication method and system for power regulation and control system
Panwar et al. Techniques for enhancing the security of fuzzy vault: a review
KR102255286B1 (en) Method for physical identity management in blockchain using a decentralized biometrics system
Cimato et al. Biometrics and privacy
JP5574005B2 (en) Biometric authentication method and system
Cavoukian Advances in Biometric Encryption: An Example of Privacy by Design From Research to Proof of Concept

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCF Information on status: patent grant

Free format text: PATENTED CASE